1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
15

hello my friend is doing a give away at 100 followers would you follow him for a chance to win 2000 vbucks his name is ZoVa_Velo

city on twitch
Computers and Technology
2 answers:
ratelena [41]3 years ago
8 0

Answer:

Awesome! Will do.

Mama L [17]3 years ago
7 0

Answer:

THIS IS A SCAM. JUST WARNING YA.

Explanation:

You might be interested in
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
IRINA_888 [86]

Answer: (B) Application layer address

Explanation:

The application layer address basically contain the specific address for the processing in the system.

This type of application layer basically enable the user for accessing the network and also provide the user interface for providing the various types of services in the database management system.

The application layer address is not provided to the computer client during the first installation time on the TCP/IP (Transmission control protocol/ Internet protocol) network.

Therefore, Option (B) is correct.

6 0
3 years ago
5. Compare the telephone network and the internet. What are the similarities? What are the differences?
kozerog [31]

Answer:

Compare the telephone network and the Internet. What are the similarities? ... The two networks are similar in the fact that both are made of interconnections of small network. The telephone network is mostly a circuit switched network; the Internet is mostly packet-switched network.

6 0
3 years ago
Which of these is NOT a desktop computer operating system?
Margarita [4]
Answer: IOS

Explanation: It is the operating system for an iPhone.
4 0
3 years ago
Read 2 more answers
Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
larisa [96]

Answer:

Tout calculateur électronique ou numérique nécessite une source d'alimentation pour fonctionner, avec son circuit configuré à la porte logique requise liée aux touches d'entrée et à l'écran de sortie.

Explanation:

Les calculatrices sont des appareils utilisés pour les calculs arithmétiques. Au 19ème siècle, les calculatrices étaient mécaniques et n'utilisaient pas de batterie, elles étaient encombrantes et utilisaient des tiges et des engrenages dans leur fonctionnement. Les calculatrices récentes sont électroniques, alimentées par une batterie. Ils comprennent un circuit électronique configuré à sa porte logique requise pour le calcul, un bouton pour l'entrée et un écran pour la sortie du calcul.

6 0
3 years ago
Develop a program that will calculate the area and perimeter of a rectangle. The length and width can be given as constant.(LENG
o-na [289]

Answer:

#include <iostream>

using namespace std;

int main()

{

 

  int length = 8;

  int width = 8;

 

  int perimeter = 2*(length + width);

  int area = length * width;

 

  cout<<"The perimeter is "<<perimeter<<endl;

  cout<<"The area is "<<area<<endl;

 

  return 0;

}

Explanation:

include the library iostream for using the input/output instructions in the c++ programming.

Create the main function and define the variable length and width with values.

Then, use the formula for calculating the perimeter and area of rectangle.

perimeter = 2*(length + width)

area = length * width

and store in the variables and finally print the output.

8 0
3 years ago
Other questions:
  • Provide Java code to illustrate how to create an array, reference an array, and address an element of an array.
    13·1 answer
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • If the variable letter has been defined as a char variable, which of the following are not valid assignment statements to assign
    8·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    15·1 answer
  • 6.16 LAB: Find largest number (EO) Write a method, findMax(), that repeatedly reads in integers until a negative integer is read
    9·1 answer
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!